Analysis
-
max time kernel
145s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-12-2024 04:37
Static task
static1
Behavioral task
behavioral1
Sample
e4b887466aeeb4ac3f00e2f6451f95ad_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
e4b887466aeeb4ac3f00e2f6451f95ad_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
e4b887466aeeb4ac3f00e2f6451f95ad_JaffaCakes118.html
-
Size
65KB
-
MD5
e4b887466aeeb4ac3f00e2f6451f95ad
-
SHA1
a08b30a15956ac6e97e63cf30b0d185a09ac999e
-
SHA256
c2871c94a54231837659e4a383d0d1b538058676c6791bb8b2db6dab9fe8f1c8
-
SHA512
9da91053353de8dcb4c0403a44e17e00e68626dcf85883d639ac3a154754edcd23a765dba1dafeb38b489954107c7aba82d40b81735296bb252b0b2ec5ec588b
-
SSDEEP
1536:/IIP7OAQj/C/GQFq6zInP7vDo3Y6hDDx0JfpX7eCU7P9Snza1:wIK1j/QGQjzInTDo3Y6hDDx0Jhqn7P9J
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1016 msedge.exe 1016 msedge.exe 1956 msedge.exe 1956 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1956 wrote to memory of 4844 1956 msedge.exe 83 PID 1956 wrote to memory of 4844 1956 msedge.exe 83 PID 1956 wrote to memory of 232 1956 msedge.exe 84 PID 1956 wrote to memory of 232 1956 msedge.exe 84 PID 1956 wrote to memory of 232 1956 msedge.exe 84 PID 1956 wrote to memory of 232 1956 msedge.exe 84 PID 1956 wrote to memory of 232 1956 msedge.exe 84 PID 1956 wrote to memory of 232 1956 msedge.exe 84 PID 1956 wrote to memory of 232 1956 msedge.exe 84 PID 1956 wrote to memory of 232 1956 msedge.exe 84 PID 1956 wrote to memory of 232 1956 msedge.exe 84 PID 1956 wrote to memory of 232 1956 msedge.exe 84 PID 1956 wrote to memory of 232 1956 msedge.exe 84 PID 1956 wrote to memory of 232 1956 msedge.exe 84 PID 1956 wrote to memory of 232 1956 msedge.exe 84 PID 1956 wrote to memory of 232 1956 msedge.exe 84 PID 1956 wrote to memory of 232 1956 msedge.exe 84 PID 1956 wrote to memory of 232 1956 msedge.exe 84 PID 1956 wrote to memory of 232 1956 msedge.exe 84 PID 1956 wrote to memory of 232 1956 msedge.exe 84 PID 1956 wrote to memory of 232 1956 msedge.exe 84 PID 1956 wrote to memory of 232 1956 msedge.exe 84 PID 1956 wrote to memory of 232 1956 msedge.exe 84 PID 1956 wrote to memory of 232 1956 msedge.exe 84 PID 1956 wrote to memory of 232 1956 msedge.exe 84 PID 1956 wrote to memory of 232 1956 msedge.exe 84 PID 1956 wrote to memory of 232 1956 msedge.exe 84 PID 1956 wrote to memory of 232 1956 msedge.exe 84 PID 1956 wrote to memory of 232 1956 msedge.exe 84 PID 1956 wrote to memory of 232 1956 msedge.exe 84 PID 1956 wrote to memory of 232 1956 msedge.exe 84 PID 1956 wrote to memory of 232 1956 msedge.exe 84 PID 1956 wrote to memory of 232 1956 msedge.exe 84 PID 1956 wrote to memory of 232 1956 msedge.exe 84 PID 1956 wrote to memory of 232 1956 msedge.exe 84 PID 1956 wrote to memory of 232 1956 msedge.exe 84 PID 1956 wrote to memory of 232 1956 msedge.exe 84 PID 1956 wrote to memory of 232 1956 msedge.exe 84 PID 1956 wrote to memory of 232 1956 msedge.exe 84 PID 1956 wrote to memory of 232 1956 msedge.exe 84 PID 1956 wrote to memory of 232 1956 msedge.exe 84 PID 1956 wrote to memory of 232 1956 msedge.exe 84 PID 1956 wrote to memory of 1016 1956 msedge.exe 85 PID 1956 wrote to memory of 1016 1956 msedge.exe 85 PID 1956 wrote to memory of 544 1956 msedge.exe 86 PID 1956 wrote to memory of 544 1956 msedge.exe 86 PID 1956 wrote to memory of 544 1956 msedge.exe 86 PID 1956 wrote to memory of 544 1956 msedge.exe 86 PID 1956 wrote to memory of 544 1956 msedge.exe 86 PID 1956 wrote to memory of 544 1956 msedge.exe 86 PID 1956 wrote to memory of 544 1956 msedge.exe 86 PID 1956 wrote to memory of 544 1956 msedge.exe 86 PID 1956 wrote to memory of 544 1956 msedge.exe 86 PID 1956 wrote to memory of 544 1956 msedge.exe 86 PID 1956 wrote to memory of 544 1956 msedge.exe 86 PID 1956 wrote to memory of 544 1956 msedge.exe 86 PID 1956 wrote to memory of 544 1956 msedge.exe 86 PID 1956 wrote to memory of 544 1956 msedge.exe 86 PID 1956 wrote to memory of 544 1956 msedge.exe 86 PID 1956 wrote to memory of 544 1956 msedge.exe 86 PID 1956 wrote to memory of 544 1956 msedge.exe 86 PID 1956 wrote to memory of 544 1956 msedge.exe 86 PID 1956 wrote to memory of 544 1956 msedge.exe 86 PID 1956 wrote to memory of 544 1956 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\e4b887466aeeb4ac3f00e2f6451f95ad_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffabf6646f8,0x7ffabf664708,0x7ffabf6647182⤵PID:4844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,8931445185380776302,13484089225643304932,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:22⤵PID:232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2156,8931445185380776302,13484089225643304932,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2156,8931445185380776302,13484089225643304932,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2712 /prefetch:82⤵PID:544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,8931445185380776302,13484089225643304932,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:4948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,8931445185380776302,13484089225643304932,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:4740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,8931445185380776302,13484089225643304932,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4748 /prefetch:12⤵PID:2512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,8931445185380776302,13484089225643304932,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4736 /prefetch:12⤵PID:1900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,8931445185380776302,13484089225643304932,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5348 /prefetch:12⤵PID:1184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,8931445185380776302,13484089225643304932,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5088 /prefetch:12⤵PID:2876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,8931445185380776302,13484089225643304932,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1324 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3276
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1972
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4564
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50a9dc42e4013fc47438e96d24beb8eff
SHA1806ab26d7eae031a58484188a7eb1adab06457fc
SHA25658d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151
SHA512868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f
-
Filesize
152B
MD561cef8e38cd95bf003f5fdd1dc37dae1
SHA111f2f79ecb349344c143eea9a0fed41891a3467f
SHA256ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e
SHA5126fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d
-
Filesize
41KB
MD59631c594f55c395f07b12046cb8fbf9d
SHA1cd6532d1689166c19477923c73083eaaf8cd21e3
SHA256a56a5d0f5f612bd39fb02fa1ff7a721a33fcb841f40c48757381b3b7c4a25726
SHA5125d3bada46dbc583755c279b5ff3c155e15f16d51b6522752ab289bdb62b71abe1d91def5733ef7e77fc01d127508d07e2c67e731bde26a478c4780c8918ba105
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD53def770f03876918d8a143d925aa91e4
SHA102f6f0b02545d1cfde8172446acbe7ba21a07f53
SHA256d878c5c170e8c077d75dbdc9f7f30bb18750f4955f9028770fa50f6e295399e6
SHA5126297e4c34fef23464bc86462185932e2852118d9c40865d97ceb36769f16fa6459ec92e08f4e365079842b4188ff8d78f317ddff8c3a6e2801316081213698cd
-
Filesize
2KB
MD54c9008c5c823d31c502e81cae7f499bb
SHA1f1727f6b437750b803a03d4521592524a2c68752
SHA256b41e8a97b8b338c0403576cea267a7f7090898b96a3b1fa18b9c4cbbb34ec7b2
SHA51295c41bb173d57cc9a1d816eb0dd42f2185c8243f3f0f362cb54008436332e118bcda5bc2f8b3fdcc0806005c12809324f862d2e5972b4793bf8863ec6c1d5bf5
-
Filesize
7KB
MD57f04cc9dbd408287718e6e8e2ea1735d
SHA17f7fedf0a74c2dc4a425ed129817c18d417b332c
SHA25669411a53e6138c7a5232016deee711955ae59e7cd05e8ed12d0c0cd2b100cb8a
SHA51261270dcd979d5f805f1130bdf659512bca8aec568eeb22b2119c011101b222e073c864d94acae0950963f340f7d44e2cf6e75dfb7465f62325eb8b57ad4f44be
-
Filesize
5KB
MD5a860ad6ba40575d47cc64a38e0a014a9
SHA1585b70cfb85b63363fe0d5ba5efb6ac516443eb8
SHA256c0cf7ff876afd837fe690421a62604c736a65583105b90c1d7730d3fce4b700b
SHA5125930b212018b1e8b6684087439e9e3235762af498faed7327b64bd5ffea37aa68b8f9a8c67c80f545a4ba59febc3152cea8e8d8a63c844f2c78f0054a37dc277
-
Filesize
10KB
MD5d92d7fe1255329456113f6f67b2ebc03
SHA1703f079b43e81d81b2c92fd8e1b7c143f756842e
SHA25609cb1963f65ea976807f28ecde64905f3cfc4ccc05adf8c70c7bb6380a0ec375
SHA512312a1e57e69a6018734a394fa279c41c2097e027487b3863710926c8abb2faf8753696c5e2b9c3ae5b6d5364961f238eee13e5ae8103583fec97fa705fabffee